Roles & Permissions¶
Understand how Preloop's Role-Based Access Control (RBAC) system works and how to manage user permissions.
Overview¶
Preloop uses Role-Based Access Control (RBAC) to manage what users can do in your account. Every user is assigned one or more roles, and each role grants a specific set of permissions.
Key concepts:
- Permissions - Atomic units of access (e.g., "manage_users", "create_flows")
- Roles - Collections of permissions (e.g., "Admin" has many permissions)
- Users - Assigned roles that determine their access level
- Teams - Groups of users that can inherit roles
Benefits:
- Fine-grained access control
- Principle of least privilege
- Easy permission management
- Audit trail of role changes
System Roles¶
Preloop provides 7 system roles that cover common access patterns. These roles are available to all accounts and cannot be modified.
1. Owner¶
Full account access including billing and account management.
Permissions:
- All permissions from Admin role
- Manage billing and subscription
- Close/delete account
- Transfer account ownership
- View all audit logs
Use cases:
- Account creator (automatically assigned)
- Primary decision maker
- Billing contact
Who should have this:
- Company founder or C-level executive
- Person responsible for payment
- Limit to 1-2 users for security
📸 Screenshot needed: role-owner-permissions.png
2. Admin¶
Full access except billing and account closure.
Permissions:
- Manage users (invite, remove, change roles)
- Manage teams
- Manage all tools and MCP servers
- Create and manage approval workflows
- Create and manage flows
- Manage trackers (GitHub, GitLab, Jira)
- View all projects and activity
- Approve any approval request
- View audit logs
Cannot:
- Manage billing/subscription
- Close/delete account
- Transfer ownership
Use cases:
- Engineering managers
- DevOps leads
- Platform administrators
Who should have this:
- Technical leaders who need full control
- Users managing the platform day-to-day
- Typically 2-5 users
3. Editor¶
Create and edit flows, tools, trackers, and projects.
Permissions:
- Create and edit flows
- Add and configure tools
- Add MCP servers (with approval)
- Connect trackers
- Create and edit projects
- Create approval workflows (own workflows only)
- View all activity
- Approve requests where listed as approver
Cannot:
- Manage users or teams
- Delete flows created by others
- Modify system-wide settings
- Access billing
Use cases:
- Senior engineers
- Technical product managers
- Automation engineers
Who should have this:
- Users building automations
- Users configuring approval workflows
- Typically 5-15 users
4. Executor¶
Execute flows and trigger tools.
Permissions:
- Execute existing flows
- Trigger tools (if allowed)
- View flow execution results
- View own approval requests
- Approve requests where listed as approver
Cannot:
- Create or edit flows
- Add tools or MCP servers
- Modify approval workflows
- Manage trackers
Use cases:
- Junior engineers
- Operations team members
- Support engineers
Who should have this:
- Users who run existing automations
- Users who need to trigger prelooped tools
- Most common role - typically 20-50% of users
5. Tracker Manager¶
Manage issue trackers and sync data.
Permissions:
- Add and remove trackers (GitHub, GitLab, Jira)
- Configure tracker settings
- Force sync tracker data
- View tracker connection status
- View issues and projects
Cannot:
- Create flows
- Manage tools
- Manage users
- Access approval workflows
Use cases:
- Engineering managers (focused on project management)
- Scrum masters
- Project managers
Who should have this:
- Users responsible for issue tracking
- Users managing project data
- Typically 2-5 users
6. Analyst¶
Read-only access plus compliance and insights features.
Permissions:
- View all flows (but not execute)
- View all tools and MCP servers
- View all trackers and projects
- View approval history and audit logs
- Run compliance checks
- Detect duplicate issues
- Analyze dependencies
Cannot:
- Create or modify anything
- Execute flows
- Trigger tools
- Approve requests
Use cases:
- Compliance officers
- Security auditors
- Business analysts
- Stakeholders who need visibility
Who should have this:
- Users who need to monitor and analyze
- Non-technical stakeholders
- Typically 5-10 users
7. Viewer¶
Read-only access to basics.
Permissions:
- View flows
- View tools
- View trackers
- View own activity
Cannot:
- Everything else
Use cases:
- External consultants
- Temporary contractors
- Demo accounts
Who should have this:
- Users who just need visibility
- External parties with limited access
- Use sparingly - prefer Analyst for internal users
Role Comparison Matrix¶
| Permission | Owner | Admin | Editor | Executor | Tracker Mgr | Analyst | Viewer |
|---|---|---|---|---|---|---|---|
| Users & Teams | |||||||
| Invite users | ✅ | ✅ | ❌ | ❌ | ❌ | ❌ | ❌ |
| Remove users | ✅ | ✅ | ❌ | ❌ | ❌ | ❌ | ❌ |
| Change user roles | ✅ | ✅ | ❌ | ❌ | ❌ | ❌ | ❌ |
| Create teams | ✅ | ✅ | ❌ | ❌ | ❌ | ❌ | ❌ |
| Manage teams | ✅ | ✅ | ❌ | ❌ | ❌ | ❌ | ❌ |
| Flows | |||||||
| View flows | ✅ | ✅ | ✅ | ✅ | ❌ | ✅ | ✅ |
| Create flows | ✅ | ✅ | ✅ | ❌ | ❌ | ❌ | ❌ |
| Edit flows | ✅ | ✅ | ✅ | ❌ | ❌ | ❌ | ❌ |
| Delete flows | ✅ | ✅ | ✅* | ❌ | ❌ | ❌ | ❌ |
| Execute flows | ✅ | ✅ | ✅ | ✅ | ❌ | ❌ | ❌ |
| Tools & MCP | |||||||
| View tools | ✅ | ✅ | ✅ | ✅ | ❌ | ✅ | ✅ |
| Add MCP servers | ✅ | ✅ | ✅** | ❌ | ❌ | ❌ | ❌ |
| Configure tools | ✅ | ✅ | ✅ | ❌ | ❌ | ❌ | ❌ |
| Trigger tools | ✅ | ✅ | ✅ | ✅ | ❌ | ❌ | ❌ |
| Approval Workflows | |||||||
| Create workflows | ✅ | ✅ | ✅*** | ❌ | ❌ | ❌ | ❌ |
| Modify workflows | ✅ | ✅ | ✅*** | ❌ | ❌ | ❌ | ❌ |
| Approve requests | ✅ | ✅ | ✅**** | ✅**** | ❌ | ❌ | ❌ |
| View approval history | ✅ | ✅ | ✅ | ✅ | ❌ | ✅ | ❌ |
| Trackers | |||||||
| Add trackers | ✅ | ✅ | ✅ | ❌ | ✅ | ❌ | ❌ |
| Remove trackers | ✅ | ✅ | ✅ | ❌ | ✅ | ❌ | ❌ |
| Force sync | ✅ | ✅ | ❌ | ❌ | ✅ | ❌ | ❌ |
| View issues | ✅ | ✅ | ✅ | ✅ | ✅ | ✅ | ✅ |
| Insights & Compliance | |||||||
| Run compliance checks | ✅ | ✅ | ❌ | ❌ | ❌ | ✅ | ❌ |
| Detect duplicates | ✅ | ✅ | ❌ | ❌ | ❌ | ✅ | ❌ |
| Analyze dependencies | ✅ | ✅ | ❌ | ❌ | ❌ | ✅ | ❌ |
| Billing & Account | |||||||
| View billing | ✅ | ❌ | ❌ | ❌ | ❌ | ❌ | ❌ |
| Manage subscription | ✅ | ❌ | ❌ | ❌ | ❌ | ❌ | ❌ |
| Close account | ✅ | ❌ | ❌ | ❌ | ❌ | ❌ | ❌ |
| View audit logs | ✅ | ✅ | ❌ | ❌ | ❌ | ✅ | ❌ |
Notes:
- * Editor can only delete flows they created
- ** Editor can add MCP servers but may require approval from Admin
- *** Editor can only create/modify workflows they own
- **** All roles can approve if listed as approver in workflow
Managing User Roles¶
Adding a New User¶
- Go to Settings → Users
- Click + Invite User
- Fill in the form:
- Click Send Invitation
📸 Screenshot needed: users-invite-form.png
What happens:
- Invitation email sent to user
- User clicks link and creates account
- User automatically added with specified role
- User appears in Users list
Changing a User's Role¶
- Go to Settings → Users
- Find the user
- Click Edit (pencil icon)
- Select new role from dropdown:
- Click Save
📸 Screenshot needed: users-change-role.png
Important notes:
- Changes take effect immediately
- User doesn't need to log out/in
- Previous permissions removed
- New permissions granted
- Role change logged in audit trail
Who can change roles:
- Owner can change anyone's role
- Admin can change roles except Owner
- No one else can change roles
Removing a User¶
- Go to Settings → Users
- Find the user
- Click Remove (trash icon)
- Confirm removal
What happens:
- User immediately loses access
- User's API keys revoked
- User's pending approval requests remain (reassigned to Admin)
- User's created flows remain (ownership transferred to Admin)
- Audit logs retained
Who can remove users:
- Owner can remove anyone
- Admin can remove anyone except Owner
- No one else can remove users
Custom Roles¶
Enterprise Feature - Custom roles allow you to create your own roles with specific permissions tailored to your organization.
Creating a Custom Role¶
- Go to Settings → Roles
- Click + Create Custom Role
-
Fill in the form:
-
Customize permissions:
-
Click Create
📸 Screenshot needed: role-custom-create.png
Use cases:
- Deployment Manager - Focused on deployment flows only
- Support Engineer - Execute flows + view issues, but no edits
- Compliance Reviewer - Analyst + approval power for specific tools
- External Consultant - Viewer + execute specific flows
Team Roles¶
Teams can be assigned roles, granting all team members those permissions.
How Team Roles Work¶
Scenario:
- Team: "SRE Team"
- Members: Alice, Bob, Charlie
- Team Role: Editor
Result:
- Alice has Editor permissions
- Bob has Editor permissions
- Charlie has Editor permissions
If Bob is also individually assigned Admin:
- Bob has Admin permissions (highest role wins)
Assigning a Role to a Team¶
- Go to Settings → Teams
- Find the team
- Click Edit
- Assign role:
- Click Save
📸 Screenshot needed: team-role-assign.png
All team members immediately get Editor permissions.
Permission Hierarchies¶
Role Hierarchy¶
Roles are hierarchical for role management purposes:
Rules:
- Owner can manage all roles
- Admin can manage all roles except Owner
- Others cannot manage roles
Permission Combination¶
If a user has multiple roles (individual + team):
Example:
- Individual role: Executor
- Team role: Editor
- Effective permissions: Editor (highest wins)
Rule: User gets the union of all permissions from all roles.
Approval Permissions¶
Who Can Approve Requests?¶
Any role can approve IF:
- They're listed as approver in the tool's approval workflow
- OR they're in a team that's listed as approver
- OR the policy says "Any Admin/Owner"
Example:
Can approve: - ✅ Members of sre_team (any role) - ✅ cto@acme.com (any role) - ❌ Other users (even if Admin)
Exception:
- Owner and Admin can override and approve any request in emergency situations
Delegation¶
Users can temporarily delegate their approval authority:
- Go to Settings → Delegations
- Click + Add Delegation
- Configure:
- Click Create
Result:
- Approval requests go to Bob instead of you
- Bob approves on your behalf
- Audit log shows delegation
Audit Trail¶
Viewing Role Changes¶
- Go to Settings → Audit Logs
- Filter by category: "User Management"
- See events:
- User invited
- User role changed
- User removed
- Team role changed
Each entry shows:
- Who made the change
- What changed (old role → new role)
- When it happened
- IP address
📸 Screenshot needed: audit-role-changes.png
Compliance Reports¶
Enterprise Feature - Generate compliance reports:
- Go to Settings → Reports
- Select Access Control Report
- Date range: Last 90 days
- Click Generate
Report includes:
- All users and their roles
- All role changes in period
- All approval requests and who approved
- Access violations (if any)
📸 Screenshot needed: compliance-access-report.png
API Access with Roles¶
API Keys Inherit User Role¶
When you create an API key: - API key inherits YOUR role - API calls have same permissions as you - Subject to same approval workflows
Example:
If you're an Executor: - API key can execute flows ✅ - API key cannot create flows ❌ - API key cannot add MCP servers ❌
Service Accounts¶
Enterprise Feature - Create dedicated service accounts for API access:
- Go to Settings → Service Accounts
- Click + Create Service Account
- Configure:
- Click Create
- Copy API key
Benefits:
- Separate from human users
- Can be rotated without affecting user
- Clear audit trail
- Can be disabled independently
📸 Screenshot needed: service-account-create.png